securing wireless technology another professional and intellectual presentation of phillip speagle

13
Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle

Upload: madisyn-hann

Post on 16-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Securing Wireless Technology

Another professional and intellectual presentation of Phillip Speagle

Sample Network Infrastructure

Wireless Standards

Accessing Wireless Router

GUI

Wireless Security Setup

• Service Set Identifier (SSID)

• Password (GUI Interface)

• MAC Filtering• Encryption

Contents

Network Infrastructure

)

)

What You Need

• At&t, Charter, Embark, Time Warner

Hi-speed Internet Access

• Computer, Ipad, Game system, etc

Wireless Device

• Motorola, Belkin, Dlink, Linksys

Cable/DSL Modem

• Linksys, Dlink, Belkin, Netgear

Wireless Router

• U.S. Curreny, Pesos, Yen, or Deblumes

Money

Wireless Standards

• 5ghz, 54Mbps, 50ft Range

802.11a

• 2.4ghz, 11Mbps, 90-100ft. Range

802.11b

• 2.4ghz, 54Mbps, 90-100ft. Range

802.11g

• 2.4 or 5ghz, 144Mps, 150ft Range

802.11n

Accessing Web Based Utility

• Username: <blank> Password: admin

Linksys Routers

(192.168.1.1)

• Username: admin Password: <blank>

D-Link Routers (192.168.0.1)

• Username: admin Password: password

Netgear Routers

(192.168.0.1)

• Username: admin Password: <blank>

Belkin Routers (192.168.2.1)

Be sure to always check

your documentation

Linksys Simulation

Wireless Security Setup (SSID)

• Name of your wireless network

Establish a new SSID

• Routers default by broadcasting the SSID to devices

Turn off broadcast

Wireless Security Setup (Default Password)

Change the default web utility password

Choose an alpha-numeric password

For example: Hellokitty80, or H3ll0k1tty80!

Each network card has a special 10-digit identifier, sometimes referred to as Physical Address. For example: 00-12-5E-8A-99

Wireless Security Setup (MAC Filtering)

Wireless Security Setup (Encryption)

WEP

• Wired Equivalent Privacy• Introduced in 1997• Old insecure encryption

TKIP

• Temporal Key Integrity Protocol• Dynamically changes the key as the

system is used• Replaced WEP as a more secure encryption

CCMP

• 128-bit encryption• Data Confidentiality, ensures only

authorized parties can access the information

Improve Your Network

Replace standard antenna with a hi-gain antenna

Make sure Signal-to-Noise Ratio is 25dB or higher. Optimum is >40dB

Centralize your wireless router

Use equipment from the same company. (For ex. Linksys router with Linksys wireless cards)

Add a wireless repeater

Reduce interference from cordless phones and other 2.4ghz devices such as microwaves

Update router firmware and wireless cards

WiFi Tech News

References

http://www.microsoft.com/athome/setup/wirelesstips.asp

http://www.wireless-nets.com/resources/tutorials/define_SNR_values.html